1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
13

A _____ network is where all computers are equal and each one is both data requester and data provider.

Computers and Technology
1 answer:
andre [41]3 years ago
8 0

Answer:

peer-to-peer network

Explanation:

i think i'm not sure though so tell me if it is wrong :)

You might be interested in
To hide the ribbon, ______ on any one of the tabs of the ribbon.
Natasha_Volkova [10]
The ribbon is a set of toolbars at the top of the window in Office programs designed to help you quickly find the commands that you need to complete a task. Sometimes the ribbon can get hidden and it's hard to find. The quickest way to show the ribbon is to click on any visible tab, like Home<span>, </span>Insert<span> or </span>Design<span>. You might also want to hide the ribbon to maximize screen space.</span>
8 0
3 years ago
An open intersection is one that
alekssr [168]

 open intersection is one without traffic control signs or signals. When you enter one, you must yield the right-of-way if: A vehicle is already in the intersection. You enter or cross a state highway from a secondary road. hope this helped


4 0
3 years ago
Read 2 more answers
What type of software is developed by volunteers, contains code in the public domain, and helped to make Linux popular
valentina_108 [34]
Perhaps I’m being 5tup1d but I think your describing open source soft in general. Linux and a lot of periphery that runs on Linux is open source so it did play a large role being that it’s not proprietary like Windows and windows adjacent soft.
5 0
2 years ago
You are hired as an IT consultant for the government owned mobile operating company, Teletalk. Based on the following scenario,
morpeh [17]

Answer:

An IT consulting report may be a transcript created via an IT professional that addresses all the possible aspects of an enterprise or a corporation. It is often an aggressive analysis report, Project reputation report, Business Plan report, or a Supply Chain Model file

Let's see how to write this kind of report

(1) Introduction.

(2) Point out the problems.

(3) Addressing the problems.

(4) business model and competitive analysis.

(5) Conclusion.

Explanation:

Teletalk may be a government telecommunication company. it's been going out of the marketplace for quite a little bit of time and is thanks to a scarcity of human resources and innovative applications within the field.

The company uses outdated Customer Management Systems (CMS) now so as to research potential customers and gather information about them. they need to be battling retaining customers after a brief period of your time. Their customer service isn't fair and therefore the customers aren't satisfied with the service provided by the corporate.

In order to function well, they need to implement enterprise resource planning ( ERP) data systems.

A data system is everything starting from Human resources to hardware and software. they will be applied everywhere from Customer Retainment and Engagement they're termed as Customer Management Systems and if it's wont to Business Model of any organization then it's referred to as Enterprise Resource Planning Systems (ERP).

By incorporating information systems in teletalk there is often a performance improvement in Sales, Management, Technology, and D-S (Demand-Supply Model).

All these are going to be an excellent advantage to teletalk so teletalk should anticipate innovating the present system with a more reliable and efficient one

6 0
3 years ago
Data is best described as
viktelen [127]

Answer:

The answer is B

Explanation:

TOOK THE TEST

5 0
3 years ago
Read 2 more answers
Other questions:
  • Writers should avoid jargon because jargon ______. a. Takes too long to use b. Limits what ideas can be explored c. Conveys too
    12·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • Why would it be beneficial to preview a page before printing?
    8·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    12·2 answers
  • A three-tier design includes a middle layer between the client and server that processes the client requests and translates them
    5·1 answer
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • Questions Presscomion
    9·1 answer
  • Who is the prince of math?
    5·2 answers
  • PLEASE HELP
    12·1 answer
  • Assume that Publication is the root class of an inheritance tree. You want to form a linked list of different publications in th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!